xv6-cs450/trap.c

106 lines
2.3 KiB
C
Raw Normal View History

2006-06-13 17:50:40 +02:00
#include "types.h"
#include "param.h"
#include "mmu.h"
#include "proc.h"
#include "defs.h"
#include "x86.h"
2006-06-15 18:02:20 +02:00
#include "traps.h"
#include "syscall.h"
2007-08-27 15:34:35 +02:00
#include "spinlock.h"
2006-06-13 17:50:40 +02:00
2006-09-07 16:12:30 +02:00
// Interrupt descriptor table (shared by all CPUs).
struct gatedesc idt[256];
2006-09-06 21:08:14 +02:00
extern uint vectors[]; // in vectors.S: array of 256 entry pointers
2007-08-27 15:34:35 +02:00
struct spinlock tickslock;
int ticks;
2006-06-13 17:50:40 +02:00
void
2006-07-17 03:25:22 +02:00
tvinit(void)
2006-06-13 17:50:40 +02:00
{
int i;
2006-09-07 18:53:16 +02:00
for(i = 0; i < 256; i++)
SETGATE(idt[i], 0, SEG_KCODE<<3, vectors[i], 0);
SETGATE(idt[T_SYSCALL], 0, SEG_KCODE<<3, vectors[T_SYSCALL], DPL_USER);
2007-08-27 15:34:35 +02:00
initlock(&tickslock, "time");
}
void
2006-07-17 03:25:22 +02:00
idtinit(void)
{
lidt(idt, sizeof(idt));
2006-06-13 17:50:40 +02:00
}
void
trap(struct trapframe *tf)
2006-06-13 17:50:40 +02:00
{
2007-08-10 19:17:42 +02:00
if(tf->trapno == T_SYSCALL){
if(cp->killed)
proc_exit();
cp->tf = tf;
2006-06-15 18:02:20 +02:00
syscall();
if(cp->killed)
proc_exit();
2006-06-15 18:02:20 +02:00
return;
}
2006-09-07 18:53:16 +02:00
// Increment nlock to make sure interrupts stay off
2006-09-08 16:29:58 +02:00
// during interrupt handler. Decrement before returning.
2006-09-07 18:53:16 +02:00
cpus[cpu()].nlock++;
2007-08-14 20:42:34 +02:00
// PAGEBREAK: 10
2007-08-10 19:17:42 +02:00
switch(tf->trapno){
2006-09-07 18:53:16 +02:00
case IRQ_OFFSET + IRQ_TIMER:
2007-08-27 15:34:35 +02:00
if(cpu() == 0){
acquire(&tickslock);
ticks++;
wakeup(&ticks);
release(&tickslock);
}
2007-08-27 15:34:35 +02:00
lapic_eoi();
break;
2006-09-07 18:53:16 +02:00
case IRQ_OFFSET + IRQ_IDE:
ide_intr();
lapic_eoi();
2006-09-07 18:53:16 +02:00
break;
case IRQ_OFFSET + IRQ_KBD:
kbd_intr();
lapic_eoi();
2006-09-07 18:53:16 +02:00
break;
case IRQ_OFFSET + IRQ_SPURIOUS:
2006-09-03 20:32:58 +02:00
cprintf("spurious interrupt from cpu %d eip %x\n", cpu(), tf->eip);
2007-08-27 15:34:35 +02:00
lapic_eoi();
2006-09-07 18:53:16 +02:00
break;
default:
2007-08-08 10:38:11 +02:00
if(cp) {
2006-09-08 16:29:58 +02:00
// Assume process divided by zero or dereferenced null, etc.
cprintf("pid %d %s: trap %d err %d on cpu %d eip %x -- kill proc\n",
2007-08-14 20:42:34 +02:00
cp->pid, cp->name, tf->trapno, tf->err, cpu(), tf->eip);
2006-09-07 18:53:16 +02:00
proc_exit();
}
2006-09-08 16:29:58 +02:00
// Otherwise it's our mistake.
2007-08-10 19:17:42 +02:00
cprintf("unexpected trap %d from cpu %d eip %x\n",
tf->trapno, cpu(), tf->eip);
2006-09-07 18:53:16 +02:00
panic("trap");
}
2006-09-07 18:53:16 +02:00
cpus[cpu()].nlock--;
2007-08-27 15:34:35 +02:00
if(tf->trapno == IRQ_OFFSET + IRQ_TIMER && cp != 0){
// Force process exit if it has been killed and is in user space.
// (If it is still executing in the kernel, let it keep running
// until it gets to the regular system call return.)
if((tf->cs&3) == DPL_USER && cp->killed)
proc_exit();
// Force process to give up CPU and let others run.
// If locks were held with interrupts on, would need to check nlock.
if(cp->state == RUNNING)
yield();
}
2006-06-13 17:50:40 +02:00
}